FDA Section 524B, IEC 81001-5-1, AAMI TIR57, ANSI/AAMI SW96, ISO 14971 and more. What they require, how they connect, and what the FDA expects to see. A plain-English field guide for Regulatory, Quality, Engineering, and Executive leaders shipping connected medical devices in 2026.
Three jobs. Skim Part 1 for the executive view. Use Part 2 as your standards reference. Pin Part 3 — the connection map — to your wall.
Cybersecurity is now a clearance requirement. Not a best practice. Not a nice-to-have. A federal statute.
Section 524B of the FD&C Act gives the FDA the authority to refuse to accept any premarket submission for a “cyber device” that does not include a complete cybersecurity package. The February 3, 2026 final guidance defines exactly what that package must contain. Every standard in this guide feeds one or more sections of that package. Miss a section, and you get a Refuse to Accept (RTA) letter — before your submission even enters review.
Enterprise IT can patch on Tuesday. A connected infusion pump cannot. A pacemaker definitely cannot.
The FDA’s reviewers are pattern-matchers. They are looking for these eight artifacts, in this order:
A single missing artifact can hold a submission for 90–180 days. On a $50M product launch, that is $8M+ in delayed revenue per quarter.
Section 524B makes the executive team accountable for cybersecurity attestation. Postmarket failures become enforcement actions, not just IT incidents.
Three actions, in order — (1) gap-assess against the 8 artifacts above, (2) fix what’s missing, (3) engage a specialist before, not after, the pre-sub meeting.
The CISO or VP of Quality should report cybersecurity submission readiness to the board quarterly, alongside clinical and manufacturing risk.
Twelve standards. One section each. Same template every time: What it is · What it requires · What the FDA expects to see · How it connects.
The federal statute and its implementing guidance. Section 524B (added by the Consolidated Appropriations Act, 2023) requires cybersecurity documentation in every premarket submission for a “cyber device.” The February 3, 2026 final guidance replaced the 2023 draft and defines the seven-section submission format the FDA now enforces at Technical Screening.
A complete cybersecurity submission package mapped to the seven sections of the February 3, 2026 guidance. Reviewers check completeness at Technical Screening before the 180-day clock starts. Missing sections = automatic RTA.
Section 524B is the umbrella. Every other standard in this guide is one of the bricks. AAMI TIR57 / SW96 handles risk. IEC 81001-5-1 handles the SPDF. IEC 62304 handles the software lifecycle. They all land in one eSTAR cybersecurity section.
eSTAR is the FDA’s interactive PDF that has replaced the legacy 510(k) format (mandatory for 510(k)s since October 2023; mandatory for De Novos since October 1, 2025). The current major version is nIVD/IVD eSTAR Version 6 (with minor releases such as v6.1 for QMSR alignment effective February 2, 2026, and v6.2). The cybersecurity section is structured — specific upload slots for specific documents, in a specific order.
Every cybersecurity field populated and consistent with attached documentation. Missing uploads or checkbox/document mismatches = early Technical Screening hold (180 days). PDFs must be PDF 1.4 / 1.7 / PDF/A-1a, with embedded fonts, alphanumeric file names, and internal bookmarks for cross-references.
eSTAR is the delivery mechanism for everything else in this guide. Each upload slot is fed by one or more underlying standards. Note: section letters have shifted between eSTAR major versions — always verify against the version you’ve downloaded from FDA.
The MedTech-specific extension of ISO 14971 for cybersecurity. TIR57 is how you do security risk management — asset identification, threat analysis, vulnerability assessment, risk evaluation, and risk control — in a way the FDA recognizes and expects.
A Cybersecurity Risk Assessment that follows TIR57 (or ANSI/AAMI SW96) structure. The assessment must cover every interface and every component in the SBOM. It must trace threats to mitigations and include a residual risk acceptability statement.
TIR57 is the operational manual for the security side of risk management. It feeds the threat model, the risk assessment, and the security architecture — all required eSTAR uploads. ANSI/AAMI SW96 (Standard 5) is the updated alternative.
The postmarket companion to TIR57. Tells you how to keep doing security risk management after the device ships — CVE monitoring, vulnerability triage, patch management, coordinated disclosure, and MDR/MedWatch integration.
A Cybersecurity Management Plan that operationalizes TIR97 — it must show who monitors what, on what cadence, and how new vulnerabilities are triaged, patched, and disclosed. Patch cadence expectations: critical CVEs within 30 days, high within 60, medium/low in planned releases.
TIR97 closes the loop on TIR57. It feeds the vulnerability management plan in the eSTAR cybersecurity section and is the backbone of any postmarket surveillance argument to the FDA.
The newer (2023) consensus standard that consolidates and updates TIR57 and TIR97 into a single, harmonized security risk management framework. The FDA’s February 3, 2026 guidance explicitly references SW96 alongside TIR57 as acceptable frameworks.
Either a TIR57+TIR97 stack or a SW96-conformant program. SW96 is the cleaner answer for new devices because it’s a single standard with a single traceability spine. Reviewers want to see explicit standard citation in the risk file header.
SW96 is the convergence standard. It replaces the need to cite TIR57 and TIR97 separately. Still requires ISO 14971 alignment for the safety-security interface and feeds the same eSTAR uploads as TIR57+TIR97.
The foundational risk management standard for medical devices — the one your QMS already lives in. Cybersecurity harms (data breach, device malfunction via cyber attack, patient injury from compromised therapy) are hazardous situations under ISO 14971. Cybersecurity controls that could create new safety hazards must also be evaluated here.
An ISO 14971 risk file that explicitly includes hazardous situations originating from cybersecurity vulnerabilities. The file must be cross-referenced to the TIR57/SW96 security risk file. Reviewers will look for the connection — if it’s not there, expect a deficiency.
ISO 14971 is the spine. TIR57/SW96 produces the security side of the inputs. IEC 62304 produces the software anomaly side. All three feed a single unified risk file that covers both safety and security in the eSTAR submission.
The software lifecycle standard for medical devices. Defines what “controlled software development” means — planning, requirements, architecture, detailed design, implementation, integration, system testing, maintenance, and problem resolution. IEC 62304 is required for any device with software, and its SOUP (Software of Unknown Provenance) list is the direct input to the SBOM.
A complete IEC 62304 software lifecycle file — including SOUP list, anomaly reports, and configuration management records. The SOUP list must be reconciled against the SBOM. Mismatches between the SOUP list and SBOM are a common deficiency.
IEC 62304 governs how software is built. IEC 81001-5-1 (Standard 8) overlays security activities on top of the IEC 62304 lifecycle. The SOUP list feeds the SBOM. Anomaly reports feed the risk file. Everything lands in the eSTAR software documentation and cybersecurity sections.
The Secure Product Development Framework (SPDF) standard. FDA’s February 3, 2026 guidance explicitly references IEC 81001-5-1 as the SPDF framework. It maps security activities — threat modeling, security requirements, secure design, security verification, vulnerability management — to each phase of the IEC 62304 lifecycle.
An SPDF document that maps every IEC 81001-5-1 activity to where in your QMS it lives. Reviewers will check that the SPDF is not a template — it must be device-specific and trace to your actual procedures and records.
IEC 81001-5-1 is the SPDF answer for FDA. It overlays IEC 62304 (Standard 7) with security. It produces inputs for the threat model, the SBOM, and the vulnerability management plan. IEC 62443-4-1 (Standard 9) is the industrial-controls alternative.
The industrial-controls-world cousin of IEC 81001-5-1. Many MedTech companies, especially those with IoT or OT components, use IEC 62443-4-1 as their SPDF framework. The FDA accepts it as SPDF evidence when the mapping to medical device cybersecurity requirements is explicit.
The FDA accepts IEC 62443-4-1 conformance as evidence of an SPDF, particularly when paired with an explicit mapping to the February 3, 2026 guidance sections. Third-party SDL assessments (not full certification) are acceptable and add credibility.
IEC 62443-4-1 is an alternative or complement to IEC 81001-5-1. Pick one as your SPDF answer. Some companies use 62443-4-1 for OT/IoT components and 81001-5-1 for the software layers. Both feed the same eSTAR SPDF upload slot.
A testable cybersecurity standard with a defined laboratory evaluation methodology. UL 2900-2-1 is the medical device profile. A UL 2900-2-1 evaluation produces a test report that can serve as the cybersecurity testing artifact in the eSTAR submission.
A UL 2900-2-1 evaluation report can serve as the cybersecurity testing artifact in the eSTAR cybersecurity section. The FDA has recognized UL 2900-2-1 in multiple guidance documents. The report must be current and cover the as-submitted device configuration.
UL 2900 is a testing & evidence standard, not a process standard. It validates what your SPDF (IEC 81001-5-1 or 62443-4-1) produced. It consumes the SBOM and the threat model as inputs and produces the pen test report as output.
The reference methodology the FDA expects pen testers to follow (800-115) and the scoring system (CVSS) for prioritizing vulnerabilities. NIST 800-30 provides the risk assessment methodology referenced in the February 3, 2026 guidance.
A pen test report that names the methodology, lists the test scope, ties findings to threat model entries, scores every finding with CVSS (with medical context), and documents the remediation disposition — fixed, mitigated, or accepted with rationale — for every finding at every severity level.
NIST 800-115 / CVSS feed the testing portion of the eSTAR cybersecurity section. They consume outputs from the threat model (TIR57/SW96) and SBOM (CVE matching) and produce the pen test report that goes into the eSTAR testing upload slot.
The EU’s regulatory framework for medical devices, with cybersecurity expectations laid out primarily in MDR Annex I (General Safety and Performance Requirements, GSPR 17) and the MDCG 2019-16 guidance document.
The FDA does not require MDR — but a Notified Body certificate aligned with MDCG 2019-16 is strong secondary evidence of cybersecurity rigor, especially in PMAs or for Breakthrough Device submissions where FDA reviewers apply heightened scrutiny.
EU MDR/IVDR is a parallel regulatory regime. The good news: the underlying standards (ISO 14971, IEC 62304, IEC 81001-5-1) are shared. A well-built FDA cybersecurity package gets you 80%+ of the way to MDCG 2019-16 conformance. Build once, file in both markets.
Standards do not live in isolation. Each one produces an artifact, and each artifact ends up in a specific slot in the eSTAR cybersecurity section. This table shows the flow.
| eSTAR Sub-Section | Artifact the FDA Expects | Standards That Produce It |
|---|---|---|
| Architecture / Threat Model | Security Architecture & Threat Model | AAMI TIR57 / SW96, STRIDE methodology, IEC 81001-5-1 §5.4 |
| Risk Assessment | Cybersecurity Risk Assessment | AAMI TIR57 / SW96 + ISO 14971 reconciliation |
| SBOM | Software Bill of Materials (SBOM) | IEC 62304 SOUP list, IEC 81001-5-1 §5.6, SPDX/CycloneDX, NTIA Minimum Elements |
| SPDF | SPDF Documentation | IEC 81001-5-1 + IEC 62443-4-1, FDA Sept 2023 / Feb 3, 2026 guidance |
| Testing | Penetration Test Report | NIST 800-115, UL 2900-2-1, CVSS scoring, full-scope methodology |
| Vulnerability Mgmt | Vulnerability Management Plan | AAMI TIR97 / SW96, ISO/IEC 30111 + 29147 (CVD), secure update mechanism |
| Labeling | Cybersecurity Labeling | FDA Feb 3, 2026 guidance, MDS2 form for hospital procurement |
You do not need another framework deck. You need an evidence package the FDA will accept on the first pass.
30-minute call. We map your device, your standards scope, and your submission timeline. You leave with a one-page gap assessment and a fixed-fee proposal.
We produce or refine the eight artifacts the FDA expects — SPDF, threat model, risk assessment, SBOM, security architecture, pen test, vulnerability management plan, and labeling.
We write the cybersecurity sections of your eSTAR, support the pre-sub if you want one, and respond to any FDA deficiency letters on cybersecurity grounds — on our dime.
No prep required. Bring your device description and your target submission date. You leave with a one-page gap assessment — regardless of whether you engage us.
We respond within 24 hours with a quote.
Tell us about your device, your timeline, and your submission type. No sales pressure — just a clear, honest assessment and a fixed-price quote.
This guide is provided free of charge by Blue Goat Cyber. It is informational and does not constitute legal or regulatory advice.
bluegoatcyber.com · (844) 939-4628